Testing Web Services for Robustness: A Tool Demo

Size: px
Start display at page:

Download "Testing Web Services for Robustness: A Tool Demo"

Transcription

1 Testing Web Services for Robustness: A Tool Demo Nuno Laranjeiro, Marco Vieira To cite this version: Nuno Laranjeiro, Marco Vieira. Testing Web Services for Robustness: A Tool Demo. Hélène WAESELYNCK. 12th European Workshop on Dependable Computing, EWDC 2009, May 2009, France. 4 p. <hal > HAL Id: hal Submitted on 12 May 2009 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

2 Testing Web Services for Robustness: A Tool Demo Nuno Laranjeiro, Marco Vieira CISUC, Department of Informatics Engineering University of Coimbra Portugal cnl@dei.uc.pt, mvieira@dei.uc.pt Abstract Web services represent a powerful interface for back-end systems that must provide a robust interface to client applications, even in the presence of invalid inputs. However, developing robust services is a difficult task. In this paper we demonstrate wsrbench, an online tool that facilitates web services robustness testing. Additionally, we present two scenarios to motivate robustness testing and to demonstrate the power of robustness testing in web services environments. 1. Introduction Web services are supported by an infrastructure that typically includes an application server, the operating system and a set of external systems (e.g., databases, payment gateways, etc). The Simple Object Access Protocol (SOAP) [1] is used for exchanging XMLbased messages between the consumer and the provider over the network. A web service may include several operations (in practice, each operation is a method with one or several input parameters) and is described using WSDL (Web Services Definition Language) [1], which is a XML format used to generate server and client code, and for configuration. Robustness testing is an effective technique to characterize the behavior of a system in presence of erroneous input conditions. It has been successfully used to assess the robustness of operating systems [3], [6] and recently has been extended to the evaluation of web services [4], [9]. Robustness tests stimulate the system under testing through its interfaces ( black-box testing) by submitting erroneous input conditions that may trigger internal errors. wsrbench [4], an online tool based on the work presented in [9], is a powerful instrument in three key scenarios: 1) help providers in evaluating and improving the robustness of their web services implementations before deployment; 2) help consumers to select the web services that best fit their requirements by testing different alternatives; and 3) help providers and consumers to identify the need for wrappers to perform the required validations before execution. The goal of this paper is to demonstrate how wsrbench can be used in practice. The goal is not to present technical details (those are available in [4], [9]), but to demonstrate the tool and present scenarios on how to use it to develop robust web services. This way, we discuss two hypothetical scenarios and two real case studies on the usage of wsrbench. The hypothetical scenarios serve as motivation to apply robustness testing in web services environments and the real case studies show that robustness testing can be applied in practice to test and compare real web services. The structure of the paper is as follows. Next section presents motivation scenarios. Section 3 summarizes the robustness testing approach and introduces wsrbench. Section 4 presents two case studies. Section 5 briefly describes the demo to be performed during the workshop and concludes the paper. 2. Motivation scenarios In this section we present two hypothetical scenarios of the usage of robustness testing Scenario #1: Selecting a web service SurveyMe is a medium size company that performs customer satisfaction surveys for large companies. As surveys are typically conducted by phone, it is of utmost importance to guarantee the correctness of the phone numbers registered in the database. A frequent situation is to find phone numbers in the database with incorrect country codes, area codes, or prefixes, due to mistakes during data collection or storage. Mr. Simms, the head of the division in charge of analyzing the results of the surveys, is concerned with the number of surveys that are not conducted, or are delayed, due to incorrect phone numbers. Mr. Simms decided to meet with Mr. Pinto, the head of the division in charge of managing and improving the software used by the company, to discuss this situation and understand if the phone number verification rules used by the application could be improved. While surfing in the Internet for potential solutions, Mr. Pinto browsed through a web page that called his attention. WebX, the owner of that web page, announces a web service that can be used to ver-

3 ify phone numbers around the world. Amazingly, the use of this web service is free of charge. This is very good and it can be easily integrated in our application thought Mr. Pinto, while searching for other services providing similar functionality. After some minutes, Mr. Pinto found two other options, both free of charge. Mr. Pinto decided use an external web service to perform phone numbers validation. However, in order to maintain the robustness of the application they needed to select a robust web service. The problem was then how to choose the web service to be used. Some time ago, Mr. Pinto read a research paper on a tool for web services robustness testing [4]. He recalled that the tool (wsrbench) was online and free to use, and decided to try the tool to test the web services. The results were impressive. With a simple configuration procedure the tool was able to automatically test the services and detect potential robustness problems. In fact, Mr. Pinto only provided the tool with the URL of each service and configured the expected domain for each input parameter. Table 1 summarizes the results. From the robustness point-of-view, TelefX should be the selected service, as it presents no robustness problems. However, this was the first step in the selection process as Mr. Pinto decided then to test the services for performance. In any case, the information gathered about these services was of utmost importance. In fact, even if one of the services with robustness issues is selected due to performance reasons the development team knows its robustness problems in detail. This information can be used to implement wrappers that perform parameter validation before web service invocation Scenario #2: Developing a web service Electrics.com is a large company specialized in producing electrical components that recently decided to develop a new database application to manage daily operations. A service-oriented approach in which a set of web services provides functionalities that can be invoked by client applications in a transparent manner. The plan was to follow an interactive lifecycle during the project. The web services would be developed first and the different user interfaces implemented afterwards. The web services would be tested immediately after their development phase. During the development of the interface to register new customers, Sanders, a junior programmer, was Table 1 Robustness-testing results for Scenario #1. Service Name Operation Parameter # Abort Failures # Hindering Failures PhoneNumbers ValidatePhone PhoneNumber 3 0 PhonesWS CheckPhone Phone 0 1 TelefX CheckNumber PhoneNumber 0 0 struggling with a problem. When inputting some values in this web page, the application returns an unexpected exception. After several hours analyzing his code Sanders was not able to find any problem and decided to perform some tests in the web services using wsrbench, an online tool he had recently found while surfing in the web [4]. After reading some documentation about the tool, Sanders started the tests by configuring some parameters. The result obtained was not a surprise for Sanders: the newcustomer web service had a problem. When a long contact was provided the web service returned a StackOverflowException exception. This way, Sanders decided to analyze the web service code in order to identify the source of the problem. However, after some hours, he was not able to identify any problem, not even with help of some other developers. Sanders then decided to ask for the help of a senior developer John, not involved in the project, but an expert in web services development. After some minutes analyzing the code, John identified the source of the problem: although the code targeting the validation of the contact parameter was in place, too large addresses caused the web service to throw a StackOverflowException. After some analysis of the code they concluded that the problem resided in the external API that was being used to validate addresses (Jakarta Commons Validator 1.3.0). This shows that robustness problems may occur even when programmers pay great attention to the code correctness. In fact, the use of third party software can raise problems that are not obvious for programmers. 3. wsrbench: A web services robustness testing tool Web services robustness testing is based on erroneous call parameters [9]. The robustness tests consist of exceptional and acceptable input values of parameters of web services operations that can be generated by applying a set of predefined rules according to the data types of each parameter. The robustness benchmark includes the following key components: workload (represents the work that the service must perform during the benchmark run); robustness tests (set of invalid call parameters that is applied to expose robustness problems); and failure modes classification (characterize the behavior of the web service while executing the workload in the presence of the robustness tests). The testing procedure is based on the following generic set of steps: 1. Tests preparation 1.1 Analysis of the WSDL of the web service under testing in order to gather information about the

4 relevant operations, parameters, and data types. 1.2 Workload generation. 2. Tests execution 2.1 Execution of the workload generated in step 1.2. The goal is to understand the expected correct behavior for the service. 2.2 Execution of the robustness tests in order to trigger faulty behaviors, and in that way disclose robustness problems. 3. Service characterization, including failure modes identification (using the data collected in step 2). The robustness of the web services is classified according to an adapted version of the CRASH scale [3] (the wscrash scale) that distinguishes the following failure modes: Catastrophic (the application server used to run the web service under testing becomes corrupted or the machine crashes or reboots), Restart (the web service execution hangs and must be terminated by force), Abort (abnormal termination of the web service execution), Silent (no error is indicated by the application server), and Hindering (the error code returned is not correct or the response is delayed). wsrbench, publicly available at implements the web services testing approach proposed in [9] and provides a web based interface that allows users to perform configurations and visualize the results of tests. Note that, anyone can use wsrbench as it is free and very easy to use. Only a very simple registration and posterior authentication process is required. In the following paragraphs we introduce the key functionalities of wsrbench (technical details can be found in [4]). After registration and authentication three key options are available for users: Configuration; Add WSDL; and My Tests. The Configuration option allows several configuration aspects to be defined, such as the user s , number of finished tests to show on screen, etc. The Add WSDL option allows users to add the WSDL file describing a web service to be tested for robustness. After submitting the WSDL file the user can visualize the set of operations and parameters provided by the service. Operations not conformant with the WS-I Basic Profile [2] will be grayed out and not tested. This standard is an industry effort to clarify the ambiguous parts of the WSDL specification and is accepted by the main service providers, including Microsoft s.net framework version 3 [5] and Sun Microsystem s Java 6 Web Services stack (JAX-WS) [7]. For each testable operation the user may define the valid values for each parameter (i.e., the domain of the parameter). When these are not defined, the tool considers that the parameter domain is the domain of the corresponding data type. After defining the domain of the parameters the tests can start (by clicking the Start Test button). The user will be informed by when the tests conclude. The My Tests option allows the user to visualize the tests previously performed along with information on currently ongoing tests. For each operation of a web service, the results for the individual faults applied to each parameter are shown. Clicking the XML link opens a popup where more details are provided. These include the list of requests sent and the service responses received. The user can mark the service interaction as a robustness problem, a correct interaction (no problem detected), or simply leave it unmarked. It is important to emphasize that, after testing a given web service, the tool performs an automatic analysis of the responses obtained in order to distinguish regular replies from replies that reveal robustness problems in the service being tested. However, in some cases the tool is not able to decide if a given response is due to a robustness problem or not. That is why the tool also allows users to perform this analysis manually. 4. wsrbench in practice In this section we present two case studies on using wsrbench to test and compare real web services Case Study #1: Testing public web services More than 100 publicly available web services were tested for robustness (most of these services are listed at a web site that references publicly available web services). The full list of web services tested can be found at [4]). About 35% of the web services tested presented robustness problems. Some silent failures were observed for two web services: Web-Service Documentation (owned by westwind.com) and Code 39 Bar Code (owned by webservicex.net). For the former, robustness tests consisting in the replacement of any parameter by a null value always leads to an absence of response from the server. For the latter, an overflowed string in the Title parameter led the server to report a null reference exception. However, web service requests submitted immediately after that abort failure remained unanswered. A total of 61 Abort failures (not counting similar errors triggered by different faults for the same parameter in a given operation) were detected. 30% were marked as null references, 30% as SQL problems, 13% conversion problems, 7% as arithmetic problems, and 21% as others.

5 4.2. Case Study #2: Comparing web services Two implementations of a subset of the TPC-App web services [8] were submitted to robustness testing (each web service implemented a single operation). As shown in Table 2, robustness problems related to abort failures were observed for both solutions. An interesting robustness problem was observed for the newcustomer service in implementation A. In fact, although the code targeting the validation of the contact parameter was in place, too large addresses caused the web service to throw a StackOverflowException. After analyzing the source code we concluded that the problem resided in the external API that was being used to validate addresses (Jakarta Commons Validator 1.3.0). This shows that robustness problems may occur even when programmers pay great attention to the code correctness. Furthermore, this type of errors can easily appear or disappear when an apparently harmless update is done to the external libraries commonly required by projects. However they can be easily detected with the help of robustness testing, which once more highlights the importance of robustness testing. The analysis of the results in Table 2 suggests that, from a consumer standpoint, the best option would be to choose the newproducts and productdetail services from implementation A, and the changepayment- Method and newcostumer services from implementation B. From the provider point-of-view, it is clear that some software improvements are needed in order to resolve the robustness problems detected. 5. Conclusion Table 2 Abort failures for TPC-App services. Web Service Impl. A Impl. B changepayment method 3 3 newcustomer 15 6 newproducts 0 2 productdetail 0 1 The goal of this paper is to demonstrate a tool for web services robustness testing. This tool builds on solid scientific concepts proposed in previous works, and seals the space between research and industry practice. In fact, wsrbench fills a gap in current development tools, providing an easy interface for robustness testing of web services. The tool is available online requiring no installation and little configuration effort. Its effectiveness will be demonstrated during the workshop and has already been proved by testing a large number of public and custom made web services. The results show that many services are deployed with robustness problems that, in some cases, may also represent security issues. For example, some of the problems uncovered show that some services may be vulnerabl to SQL injection attacks, which highlights the importance of testing services for robustness. This is something that could be easily avoided if these services were tested for robustness by wsrbench. The wsrbench demo during the workshop will be organized as follows. First we will discuss basic concepts on robustness testing and present the two hypothetical scenarios for the use of robustness testing in web services environments. Then we will introduce the key functionalities of the tool. Finally, we will show the power of the tool in practice by applying it to several web services publicly available in the Internet and to some of the web services from the TPC-App performance benchmark. In the latter case, we will demonstrate how the robustness problems disclosed can be fixed by adding appropriate input validators. It is important to emphasize that we are planning a hands-on demo. In fact, the tool will be effectively demonstrated and explained during the talk. Participants will have the possibility to try the tool during or after the workshop. Our goal is to motivate researchers and practitioners working on web services to try it and to foster research on this important topic. 6. References [1] Curbera, F., et al., Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI, Internet Computing, IEEE, vol. 6, 2002, pp [2] Ferris, C., et al., Basic Profile - Version 1.2, 2007; [3] Koopman, P., DeVale, J., "Comparing the robustness of POSIX operating systems," Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing, [4] Laranjeiro, N., Canelas, S., Vieira, M., "wsrbench: An On-Line Tool for Robustness Benchmarking", IEEE International Conference on Services Computing (SCC 2008), Honolulu, Hawaii, USA, July [5] Microsoft,.NET Framework Developer Center, 2008; [6] Rodríguez, M., et al., "MAFALDA: Microkernel Assessment by fault injection and design aid", 3rd European Dependable Computing Conference, EDCC-3, [7] Sun Microsystems, Inc., JAX-WS Reference Implementation ; [8] Transaction Processing Performance Council, TPC BenchmarkTM App (Application Server) Standard Specification, Version 1.1, 2005, available at: [9] Vieira, M., Laranjeiro, N., Madeira, H., Benchmarking the Robustness of Web Services, 13th IEEE Pacific Rim Dependable Computing Conference (PRDC 2007), Melbourne, Australia, 2007.

ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System

ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,

More information

Mobility management and vertical handover decision making in heterogeneous wireless networks

Mobility management and vertical handover decision making in heterogeneous wireless networks Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in

More information

A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures

A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,

More information

Protecting Database Centric Web Services against SQL/XPath Injection Attacks

Protecting Database Centric Web Services against SQL/XPath Injection Attacks Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal

More information

A usage coverage based approach for assessing product family design

A usage coverage based approach for assessing product family design A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale

More information

Detecting SQL Injection Vulnerabilities in Web Services

Detecting SQL Injection Vulnerabilities in Web Services Detecting SQL Injection Vulnerabilities in Web Services Nuno Antunes, {nmsa, mvieira}@dei.uc.pt LADC 2009 CISUC Department of Informatics Engineering University of Coimbra Outline n Web Services n Web

More information

Study on Cloud Service Mode of Agricultural Information Institutions

Study on Cloud Service Mode of Agricultural Information Institutions Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud

More information

QASM: a Q&A Social Media System Based on Social Semantics

QASM: a Q&A Social Media System Based on Social Semantics QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media

More information

FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data

FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:

More information

Managing Risks at Runtime in VoIP Networks and Services

Managing Risks at Runtime in VoIP Networks and Services Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in

More information

Additional mechanisms for rewriting on-the-fly SPARQL queries proxy

Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting

More information

Global Identity Management of Virtual Machines Based on Remote Secure Elements

Global Identity Management of Virtual Machines Based on Remote Secure Elements Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management

More information

Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?

Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.

More information

Online vehicle routing and scheduling with continuous vehicle tracking

Online vehicle routing and scheduling with continuous vehicle tracking Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle

More information

ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development

ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida To cite this version: Stefanie Scherzinger, Thomas

More information

Information Technology Education in the Sri Lankan School System: Challenges and Perspectives

Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri

More information

Using Web Security Scanners to Detect Vulnerabilities in Web Services

Using Web Security Scanners to Detect Vulnerabilities in Web Services FACULDADE DE CIÊNCIAS E TECNOLOGIA DA UNIVERSIDADE DE COIMBRA DEPARTAMENTO DE ENGENHARIA INFORMÁTICA Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira Nuno Antunes Henrique

More information

Aligning subjective tests using a low cost common set

Aligning subjective tests using a low cost common set Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,

More information

Use of tabletop exercise in industrial training disaster.

Use of tabletop exercise in industrial training disaster. Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas

More information

Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.

Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne

More information

VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process

VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.

More information

Protecting Database Centric Web Services against SQL/XPath Injection Attacks

Protecting Database Centric Web Services against SQL/XPath Injection Attacks Protecting Database Centric Web Services against SQL/XPath Injection Attacks Nuno Laranjeiro, Marco Vieira, and Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra, Portugal

More information

Expanding Renewable Energy by Implementing Demand Response

Expanding Renewable Energy by Implementing Demand Response Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable

More information

The Devils Behind Web Application Vulnerabilities

The Devils Behind Web Application Vulnerabilities The Devils Behind Web Application Vulnerabilities Defending against Web Application Vulnerabilities IEEE Computer, February 2012 Nuno Antunes, Marco Vieira {nmsa, mvieira}@dei.uc.pt Postgrad Colloquium

More information

Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.

Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,

More information

Territorial Intelligence and Innovation for the Socio-Ecological Transition

Territorial Intelligence and Innovation for the Socio-Ecological Transition Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and

More information

IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs

IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs Thomas Durieux, Martin Monperrus To cite this version: Thomas Durieux, Martin Monperrus. IntroClassJava: A Benchmark of 297 Small and Buggy

More information

ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS

ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,

More information

GDS Resource Record: Generalization of the Delegation Signer Model

GDS Resource Record: Generalization of the Delegation Signer Model GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization

More information

An update on acoustics designs for HVAC (Engineering)

An update on acoustics designs for HVAC (Engineering) An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,

More information

Automated Faultinjection Series - Risk Management and Implementation

Automated Faultinjection Series - Risk Management and Implementation HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing Applications Christof Fetzer, Zhen Xiao AT&T Labs Research 180 Park Avenue Florham Park, N.J. 07932 christof, xiao @research.att.com

More information

Minkowski Sum of Polytopes Defined by Their Vertices

Minkowski Sum of Polytopes Defined by Their Vertices Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal

More information

Novel Client Booking System in KLCC Twin Tower Bridge

Novel Client Booking System in KLCC Twin Tower Bridge Novel Client Booking System in KLCC Twin Tower Bridge Hossein Ameri Mahabadi, Reza Ameri To cite this version: Hossein Ameri Mahabadi, Reza Ameri. Novel Client Booking System in KLCC Twin Tower Bridge.

More information

The Effectiveness of non-focal exposure to web banner ads

The Effectiveness of non-focal exposure to web banner ads The Effectiveness of non-focal exposure to web banner ads Marc Vanhuele, Didier Courbet, Sylvain Denis, Frédéric Lavigne, Amélie Borde To cite this version: Marc Vanhuele, Didier Courbet, Sylvain Denis,

More information

New implementions of predictive alternate analog/rf test with augmented model redundancy

New implementions of predictive alternate analog/rf test with augmented model redundancy New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:

More information

Towards Collaborative Learning via Shared Artefacts over the Grid

Towards Collaborative Learning via Shared Artefacts over the Grid Towards Collaborative Learning via Shared Artefacts over the Grid Cornelia Boldyreff, Phyo Kyaw, Janet Lavery, David Nutter, Stephen Rank To cite this version: Cornelia Boldyreff, Phyo Kyaw, Janet Lavery,

More information

Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically

Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,

More information

SELECTIVELY ABSORBING COATINGS

SELECTIVELY ABSORBING COATINGS SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),

More information

A model driven approach for bridging ILOG Rule Language and RIF

A model driven approach for bridging ILOG Rule Language and RIF A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.

More information

Cobi: Communitysourcing Large-Scale Conference Scheduling

Cobi: Communitysourcing Large-Scale Conference Scheduling Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi

More information

Robustness and Security Testing in SOA

Robustness and Security Testing in SOA Outline n The SOA trend Robustness and Security Testing in SOA Challenges & Opportunities n Robustness and security testing in Web Services n Are Web Services robust and/or secure? n Is it done? No, there

More information

Adaptive Fault Tolerance in Real Time Cloud Computing

Adaptive Fault Tolerance in Real Time Cloud Computing Adaptive Fault Tolerance in Real Time Cloud Computing Sheheryar Malik, Fabrice Huet To cite this version: Sheheryar Malik, Fabrice Huet. Adaptive Fault Tolerance in Real Time Cloud Computing. 2011 IEEE

More information

Using Web Security Scanners to Detect Vulnerabilities in Web Services

Using Web Security Scanners to Detect Vulnerabilities in Web Services DSN 2009 Using Web Security Scanners to Detect Vulnerabilities in Web Services Marco Vieira,, Henrique Madeira {mvieira, nmsa, henrique}@dei.uc.pt CISUC Department of Informatics Engineering University

More information

ISO9001 Certification in UK Organisations A comparative study of motivations and impacts.

ISO9001 Certification in UK Organisations A comparative study of motivations and impacts. ISO9001 Certification in UK Organisations A comparative study of motivations and impacts. Scott McCrosson, Michele Cano, Eileen O Neill, Abdessamad Kobi To cite this version: Scott McCrosson, Michele Cano,

More information

Dissertation Masters in Informatics Engineering

Dissertation Masters in Informatics Engineering Dissertation Masters in Informatics Engineering Evaluating Web Services Security Nuno Manuel dos Santos Antunes nmsa@dei.uc.pt Advisor: Prof. Marco Vieira 10-07-2009 Department of Informatics Engineering

More information

Ontology-based Tailoring of Software Process Models

Ontology-based Tailoring of Software Process Models Ontology-based Tailoring of Software Process Models Ricardo Eito-Brun To cite this version: Ricardo Eito-Brun. Ontology-based Tailoring of Software Process Models. Terminology and Knowledge Engineering

More information

What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model

What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model Seungwoo Kang, Sandrine Selosse, Nadia Maïzi To cite this version: Seungwoo Kang, Sandrine

More information

Towards Unified Tag Data Translation for the Internet of Things

Towards Unified Tag Data Translation for the Internet of Things Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified

More information

Comparing the Effectiveness of Penetration Testing and Static Code Analysis

Comparing the Effectiveness of Penetration Testing and Static Code Analysis Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, nmsa@dei.uc.pt, mvieira@dei.uc.pt University

More information

Cloud Services ADM. Agent Deployment Guide

Cloud Services ADM. Agent Deployment Guide Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License

More information

Optimization results for a generalized coupon collector problem

Optimization results for a generalized coupon collector problem Optimization results for a generalized coupon collector problem Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers, Bruno Sericola To cite this version: Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers,

More information

Running an HCI Experiment in Multiple Parallel Universes

Running an HCI Experiment in Multiple Parallel Universes Running an HCI Experiment in Multiple Parallel Universes,, To cite this version:,,. Running an HCI Experiment in Multiple Parallel Universes. CHI 14 Extended Abstracts on Human Factors in Computing Systems.

More information

ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON

ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER

More information

Proposal for the configuration of multi-domain network monitoring architecture

Proposal for the configuration of multi-domain network monitoring architecture Proposal for the configuration of multi-domain network monitoring architecture Aymen Belghith, Bernard Cousin, Samer Lahoud, Siwar Ben Adj Said To cite this version: Aymen Belghith, Bernard Cousin, Samer

More information

Application-Aware Protection in DWDM Optical Networks

Application-Aware Protection in DWDM Optical Networks Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical

More information

Web services commonly provide the strategic. Penetration Testing for Web Services

Web services commonly provide the strategic. Penetration Testing for Web Services COVER FEATURE Penetration Testing for Web Services Nuno Antunes and Marco Vieira, University of Coimbra, Portugal Web services are often deployed with critical software security faults that open them to

More information

Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers

Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed

More information

Advantages and disadvantages of e-learning at the technical university

Advantages and disadvantages of e-learning at the technical university Advantages and disadvantages of e-learning at the technical university Olga Sheypak, Galina Artyushina, Anna Artyushina To cite this version: Olga Sheypak, Galina Artyushina, Anna Artyushina. Advantages

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3

More information

A Virtual Teacher Community to Facilitate Professional Development

A Virtual Teacher Community to Facilitate Professional Development A Virtual Teacher Community to Facilitate Professional Development Desislava Ratcheva, Eliza Stefanova, Iliana Nikolova To cite this version: Desislava Ratcheva, Eliza Stefanova, Iliana Nikolova. A Virtual

More information

The truck scheduling problem at cross-docking terminals

The truck scheduling problem at cross-docking terminals The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking

More information

E-commerce and Network Marketing Strategy

E-commerce and Network Marketing Strategy Towards Business Ontologies Matching for Inter-Enterprise Collaboration Platform in a Lean Manufacturing Strategy Ahlem Zayati, Lilia Sidhom, Youakim Badr, Frédérique Biennier, Mohamed Moalla To cite this

More information

Web services with WebSphere Studio: Deploy and publish

Web services with WebSphere Studio: Deploy and publish Web services with WebSphere Studio: Deploy and publish Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Introduction...

More information

Cracks detection by a moving photothermal probe

Cracks detection by a moving photothermal probe Cracks detection by a moving photothermal probe J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, M. Pigeon, J. Sellier To cite this version: J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, et

More information

Hinky: Defending Against Text-based Message Spam on Smartphones

Hinky: Defending Against Text-based Message Spam on Smartphones Hinky: Defending Against Text-based Message Spam on Smartphones Abdelkader Lahmadi, Laurent Delosière, Olivier Festor To cite this version: Abdelkader Lahmadi, Laurent Delosière, Olivier Festor. Hinky:

More information

An Automatic Reversible Transformation from Composite to Visitor in Java

An Automatic Reversible Transformation from Composite to Visitor in Java An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,

More information

Evaluating and Comparing the Impact of Software Faults on Web Servers

Evaluating and Comparing the Impact of Software Faults on Web Servers Evaluating and Comparing the Impact of Software Faults on Web Servers April 2010, João Durães, Henrique Madeira CISUC, Department of Informatics Engineering University of Coimbra {naaliel, jduraes, henrique}@dei.uc.pt

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: April 26, 2013 Active Directory Management Deployment Guide i Contents System Requirements... 1 Hardware Requirements... 2 Agent

More information

Virtual plants in high school informatics L-systems

Virtual plants in high school informatics L-systems Virtual plants in high school informatics L-systems Janka Majherov To cite this version: Janka Majherov. Virtual plants in high school informatics L-systems. Michael E. Auer. Conference ICL2007, September

More information

Diversity against accidental and deliberate faults

Diversity against accidental and deliberate faults Diversity against accidental and deliberate faults Yves Deswarte, Karama Kanoun, Jean-Claude Laprie To cite this version: Yves Deswarte, Karama Kanoun, Jean-Claude Laprie. Diversity against accidental

More information

A Contactless E-health Information System with Privacy

A Contactless E-health Information System with Privacy A Contactless E-health Information System with Privacy Aude Plateaux, Patrick Lacharme, Christophe Rosenberger, Kumar Murty To cite this version: Aude Plateaux, Patrick Lacharme, Christophe Rosenberger,

More information

Multilateral Privacy in Clouds: Requirements for Use in Industry

Multilateral Privacy in Clouds: Requirements for Use in Industry Multilateral Privacy in Clouds: Requirements for Use in Industry Ina Schiering, Markus Hansen To cite this version: Ina Schiering, Markus Hansen. Multilateral Privacy in Clouds: Requirements for Use in

More information

Digital libraries: Comparison of 10 software

Digital libraries: Comparison of 10 software Digital libraries: Comparison of 10 Mathieu Andro, Emmanuelle Asselin, Marc Maisonneuve To cite this version: Mathieu Andro, Emmanuelle Asselin, Marc Maisonneuve. Digital libraries: Comparison of 10. Library

More information

Using Feature Modelling and Automations to Select among Cloud Solutions

Using Feature Modelling and Automations to Select among Cloud Solutions Using Feature Modelling and Automations to Select among Cloud Solutions Clément Quinton, Laurence Duchien, Patrick Heymans, Stéphane Mouton, Etienne Charlier To cite this version: Clément Quinton, Laurence

More information

Introduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson

Introduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Introduction to Oracle WebLogic Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Agenda Overview Download and installation A concrete scenario using the real product Hints for the project Overview

More information

Training Ircam s Score Follower

Training Ircam s Score Follower Training Ircam s Follower Arshia Cont, Diemo Schwarz, Norbert Schnell To cite this version: Arshia Cont, Diemo Schwarz, Norbert Schnell. Training Ircam s Follower. IEEE International Conference on Acoustics,

More information

Model-Driven Testing based on Markov Chain Usage Models in the Automotive Domain

Model-Driven Testing based on Markov Chain Usage Models in the Automotive Domain Model-Driven Testing based on Markov Chain Usage Models in the Automotive Domain Sebastian Siegl, Winfried Dulz, Reinhard German, Gerhard Kiffe To cite this version: Sebastian Siegl, Winfried Dulz, Reinhard

More information

Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA

Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA Duan Yucong, Christophe Cruz, Christophe Nicolle To cite this version: Duan Yucong, Christophe Cruz, Christophe Nicolle.

More information

Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation

Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation Florent Berthelot, Fabienne Nouvel, Dominique Houzet To cite this version: Florent Berthelot,

More information

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6

Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 2 Installing the ASP.NET VETtrak APIs onto IIS 5 or 6 3... 3 IIS 5 or 6 1 Step 1- Install/Check 6 Set Up and Configure VETtrak ASP.NET API 2 Step 2 -...

More information

A modeling approach for locating logistics platforms for fast parcels delivery in urban areas

A modeling approach for locating logistics platforms for fast parcels delivery in urban areas A modeling approach for locating logistics platforms for fast parcels delivery in urban areas Olivier Guyon, Nabil Absi, Dominique Feillet, Thierry Garaix To cite this version: Olivier Guyon, Nabil Absi,

More information

Wide-Field Plate Database: Service for Astronomy

Wide-Field Plate Database: Service for Astronomy Wide-Field Plate Database: Service for Astronomy Milcho K. Tsvetkov To cite this version: Milcho K. Tsvetkov. Wide-Field Plate Database: Service for Astronomy. IMCCE. International Workshop NAROO-GAIA

More information

Building and Using Web Services With JDeveloper 11g

Building and Using Web Services With JDeveloper 11g Building and Using Web Services With JDeveloper 11g Purpose In this tutorial, you create a series of simple web service scenarios in JDeveloper. This is intended as a light introduction to some of the

More information

Physicians balance billing, supplemental insurance and access to health care

Physicians balance billing, supplemental insurance and access to health care Physicians balance billing, supplemental insurance and access to health care Izabela Jelovac To cite this version: Izabela Jelovac. Physicians balance billing, supplemental insurance and access to health

More information

WebSphere Portal Server and Web Services Whitepaper

WebSphere Portal Server and Web Services Whitepaper WebSphere Server and s Whitepaper Thomas Schaeck (schaeck@de.ibm.com) IBM Software Group Abstract As web services will become the predominant method for making information and applications available programmatically

More information

Improved Method for Parallel AES-GCM Cores Using FPGAs

Improved Method for Parallel AES-GCM Cores Using FPGAs Improved Method for Parallel -GCM Cores Using FPGAs Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez To cite this version: Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez.

More information

InsideView Lead Enrich Setup Guide for Marketo

InsideView Lead Enrich Setup Guide for Marketo InsideView Lead Enrich Setup Guide for Marketo ... 1 Step 1: Sign up for InsideView for Marketing... 1 Step 2: Create Custom Fields... 3 Step 3: Create a Webhook for InsideView for Marketing... 5 Step

More information

CHAPTER 10: WEB SERVICES

CHAPTER 10: WEB SERVICES Chapter 10: Web Services CHAPTER 10: WEB SERVICES Objectives Introduction The objectives are: Provide an overview on how Microsoft Dynamics NAV supports Web services. Discuss historical integration options,

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

T320 E-business technologies: foundations and practice

T320 E-business technologies: foundations and practice T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static

More information

RFID Security and Privacy

RFID Security and Privacy RFID Security and Privacy Michel Arnaud To cite this version: Michel Arnaud. RFID Security and Privacy. Deploying RFID Challenges, Solutions and Open Issues, INTECH, pp. 366-376, 2011. HAL

More information

Introduction to the papers of TWG18: Mathematics teacher education and professional development.

Introduction to the papers of TWG18: Mathematics teacher education and professional development. Introduction to the papers of TWG18: Mathematics teacher education and professional development Stefan Zehetmeier, Marc Bosse, Laurinda Brown, Alena Hošpesová, Nicolina Malara, Bettina Rösken-Winter To

More information

WA2087 Programming Java SOAP and REST Web Services - WebSphere 8.0 / RAD 8.0. Student Labs. Web Age Solutions Inc.

WA2087 Programming Java SOAP and REST Web Services - WebSphere 8.0 / RAD 8.0. Student Labs. Web Age Solutions Inc. WA2087 Programming Java SOAP and REST Web Services - WebSphere 8.0 / RAD 8.0 Student Labs Web Age Solutions Inc. 1 Table of Contents Lab 1 - WebSphere Workspace Configuration...3 Lab 2 - Introduction To

More information

P2Prec: A Social-Based P2P Recommendation System

P2Prec: A Social-Based P2P Recommendation System P2Prec: A Social-Based P2P Recommendation System Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger To cite this version: Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger. P2Prec:

More information

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE: Java WebService BENEFITS OF ATTENDANCE: PREREQUISITES: Upon completion of this course, students will be able to: Describe the interoperable web services architecture, including the roles of SOAP and WSDL.

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

How to consume a Domino Web Services from Visual Studio under Security

How to consume a Domino Web Services from Visual Studio under Security How to consume a Domino Web Services from Visual Studio under Security Summary Authors... 2 Abstract... 2 Web Services... 3 Write a Visual Basic Consumer... 5 Authors Andrea Fontana IBM Champion for WebSphere

More information

Methodology of organizational learning in risk management : Development of a collective memory for sanitary alerts

Methodology of organizational learning in risk management : Development of a collective memory for sanitary alerts Methodology of organizational learning in risk management : Development of a collective memory for sanitary alerts Wim Van Wassenhove, Jean-Luc Wybo To cite this version: Wim Van Wassenhove, Jean-Luc Wybo.

More information

Bitrix Site Manager ASP.NET. Installation Guide

Bitrix Site Manager ASP.NET. Installation Guide Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary

More information

Vulnerability Assessment in Autonomic Networks and Services: A Survey

Vulnerability Assessment in Autonomic Networks and Services: A Survey Vulnerability Assessment in Autonomic Networks and Services: A Survey Martín Barrère, Rémi Badonnel, Olivier Festor To cite this version: Martín Barrère, Rémi Badonnel, Olivier Festor. Vulnerability Assessment

More information